3. The vulnerability is caused due to an unspecified error. The remote user is connected to a wireless network can view and change the configuration of the device, even if the «management over wireless» disabled.